{"affected":[{"ecosystem_specific":{"binaries":[{"glibc":"2.31-150300.83.1","glibc-devel":"2.31-150300.83.1","glibc-locale":"2.31-150300.83.1","glibc-locale-base":"2.31-150300.83.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.5","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Micro%205.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.31-150300.83.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glibc fixes the following issues:\n\n- CVE-2024-33599: Fixed a stack-based buffer overflow in netgroup cache in nscd (bsc#1223423)\n- CVE-2024-33600: Avoid null pointer crashes after notfound response in nscd (bsc#1223424)\n- CVE-2024-33600: Do not send missing not-found response in addgetnetgrentX in nscd (bsc#1223424)\n- CVE-2024-33601, CVE-2024-33602: Fixed use of two buffers in addgetnetgrentX ( bsc#1223425)\n- CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425)\n\n- Avoid creating userspace live patching prologue for _start routine (bsc#1221940)\n\n","id":"SUSE-SU-2024:1895-2","modified":"2024-06-03T07:00:59Z","published":"2024-06-03T07:00:59Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241895-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221940"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223423"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223425"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-33599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-33600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-33601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-33602"}],"related":["CVE-2024-33599","CVE-2024-33600","CVE-2024-33601","CVE-2024-33602"],"summary":"Security update for glibc","upstream":["CVE-2024-33599","CVE-2024-33600","CVE-2024-33601","CVE-2024-33602"]}